Showing posts with label Internet Hacking. Show all posts
Showing posts with label Internet Hacking. Show all posts

Thursday, June 10, 2010

How to Hack E-Mail Account Password - Email Hacking Software

How to Hack Email Account Passwords Using ProRat?
1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Wednesday, May 12, 2010

How to Change Your IP Adress and Surf The Web Anonymously

Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection.

Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a software,
Invisible IP Map, that can make you be "anywhere" in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world XD.

Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.


Product Information:

This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on "Get IP Locations". The main benefit of this software is that you can't be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address.

Main Screens:



  • Map Menu: This is they key part of the software. Here you can change your IP address, retreive IP locations, get information about your IP location or the location of the other server. In addition, you can recheck the servers.
  • IP Information: This screen will give you all the information about your IP and the remote IP. You can see information such as city, region, country, distance between you and the remote server, server type, timeout etc.
  • Custom proxy checker: The proxy checker is specially designed for those of you who have own proxy lists. You can add them to the checker and check whether they are working.
  • VIP Servers: This is optional add-on for Invisible IP Map software. The VIP servers will give you a high-speed internet access with 128 Bit SSL encryption.

Download Invisible IP Map

How To Activate :

1. Replace the original "Options.ini" in the program files folder with the one in the RAR (downloaded one ) and then open the program again. Don't use the details in the
ini.


2. After doing that here are the results:


Serial Number for Invisible IP Map:

NAME: SIR_WILLIAMZ
EMAIL: SIRWILLIAMZ@YAHOO.CA
SERIAL: 00822631340408026

This is a very great software and i recommend you to try it. Enjoy .









How to Hack AIM Account Password


Hacking AIM / AOL Account Username and Password using AIM Phishing

I've been posting a lot about Phishing and Keylogging on this blog. Basically these two methods are most used for hacking email accounts. Here i'll show you how to hack AIM Username and Password using Phishing. Basically a phisher is a fake login page, that is made to look exactly like the real login page of the real website so as to fool somebody into entering their information and sending it to you.



How To Hack AIM Account Password?

1. First of all Download AIM Phisher.

2. The downloaded file contains:
  • aim.html
  • next.php
  • pass.txt
3. Upload all of the files to any free webhost site like:
4. Once you have uploaded the files in the directory, send this phisher link (aim.html) to your victim and make him login to his AIM account using your sent Phisher.

5. Once he logs in to his AIM account using Phisher, all his typed AIM id and password is stored in "pass.txt".


6. Now, open pass.txt to get hacked AIM id and password as shown.


That's all. If you have any problems using phishing or want to know more about it, read my articles What is Phishing and how to use it for hacking? and Learn Everything About Phishing

Happy Hacking !

Do you have questions, comments, or suggestions? Feel free to post a comment!

Friday, April 30, 2010

Increase the speed of your internet connection without a new modem

As more and more people get quick connections to the internet, such as cable or ADSL, it becomes apparent to the user of a simple dial-up modem that the World Wide Web can quickly turn into the World Wide Wait. Here a trick that can help speed up your current modem without shelling out the big bucks.

There is a setting located in your windows registry called the Maximum Transfer Unit (MTU). This determines the size of the packets of data sent between your and your server. In Windows 95, this setting is has a value of 1,500 bytes when the actual size of internet packets is 1,000 bytes. This can sometimes slow things down. To remedy the situation, simply follow these steps:
In the registry editor (Start > Run > regedit.exe), navigate to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Class\NetTrans.

In the NetTrans folder you should find another folder named "000x" in which x represents a fourth digit. Right-click on the "000x" folder and select New and StringValue. Rename the item that appears in the panel on the right side to MaxMTU, then double-click it to bring up the Edit String box and give it a velue of 1002.

Remember to keep playing with the MaxMTU value until you feel that your internet connection has greatly sped up. Some people report huge speed gains using this tricks, while others hardly notice a difference. In any case, it's definetly worth a try.

Thursday, April 29, 2010

Winamp Hacking Fr Unlimited Music

Winamp Hacking : Rahul Dutt Avasthy

Using a loophole in a winamp plugin, you can download and burn music from Napster for free.


music CDs, zero dollars*, obtained legally.

*Not including the cost of blank CDs


Practical how to:


0. Download and install Napster, sign up for 14 day free trial.
1. Download and install Winamp
2. Download and install the Winamp Plug-in Output Stacker
3. Open Winamp Options->Plug-ins->Output->Dietmar's Output Stacker->Configure


a. Add out_ds.dll from Winamp/Plug-ins folder
b. Add out_disk.dll from Winamp/Plug-ins folder
c. Select out_disk.dll in the Output Stacker->Configure
d. Set the output directory and output file mode to Force WAV file
e. Exit preferences


4. Load downloaded Napster protected WMAs into your Winamp playlist
5. Press play and each file will be converted to WAV as it plays
6. Burn WAVs to CD with your favorite burning program


Theoretical fun:



Three computers, one fast networked drive, and a few dedicated people: Turning Napster's 14 day free trial into 252 full 80 minute CDs of free music.
New key developments:

-If you use the "Out-lame" Winamp plugin in the Output Stacker in place of "Out-disk", you can convert straight to MP3. It still encodes no faster than realtime, but this is a great way to conserve space. WAV(Out-disk) is still recommended if you are burning CDs and want to keep as much quality as possible. I can confirm that this all works.

-You can run multiple instances of Winamp at once, each converting its own song. Each instance's playback will not interfere with any of the others, illustrating the fact that this is not simply recording the music off of your soundcard. Doing this, you can get FAR MORE than 252 full 80 minute CDs within 14 days. I can confirm that this works.

You can transcode(MP3) or decode(WAV) X albums in the time it takes for the longest track on the album to elapse. And since you're not limited to only tracks from one album at a time, you can trans/decode as many tracks as instances of Winamp your computer will run limited only by your computer's resources.
Quote from Napster's official statement:

"It would take 10 hours to convert 10 hours of music in this manner."

With the updated methods, you can convert 100 hours or 1,000 hours or 10,000 hours of music in 10 hours. The only limit is your computing resources.

Advanced Rapidshare Hacking

We all know that getting a new IP address from ISP allows us to download the next file from RapidShare. I bet many of us know this concept long ago but there wasn't any program that can do this. Now, here is a program called Cryptload that is able to download the first file automatically without you entering the CAPTCHA code, and when it finished downloading, it will try to download the second file. Once it detects "You have reached the download-limit for free-users" message from RapidShare, it'll disconnect and reconnect your Internet to get a new IP address. Then it'll continue downloading the second file. All this is done automatically and you only need to add the RapidShare links to Cryptload. How easy is that?
Unlimited rapidshare  downloading But before you get to automate RapidShare downloading, I'll show you what you need to do because I was stuck for a few days on Cryptload with some problems. Cryptload options buttonMost important setting that you must get it right is the Router section. Other than that, there is nothing else you need to configure in Cryptload. You can access Cryptload options by clicking the top right button that looks like this. Click on the Router button to configure your router settings. If you are using a modem to connect to the internet, select the Modem button. How do you know if you're using a modem or router? If you need to dial up to the Internet like the below image, then you're using a modem.
Advanced Rapidshare Hacking - The Ethical Hacking
If your internet automatically when you turn on the power for the small box, then it's a router. So if you are using a router, click on the dropbox and search for your router model in the list.
Advanced Rapidshare  Hacking - The Ethical Hacking
Here are the settings you must configure correctly.
IP Address: The IP Address of your router. To know your router's IP address, run command prompt, type ipconfig and the Default Gateway is your router's IP address.
Username and Password: The username and password used to login to your router. Please check your router's manual if you don't know the default login data.
Waittime after reconnect in sec: This is the time that it'll wait to download the next RapidShare file after Cryptload tries to reconnect to the Internet. It depends on your ISP. Some might take longer to reconnect. Try 15 seconds first and if your Internet doesn't gets connected before 15 seconds, increase it to 30 seconds and so on... Now you can use Cryptload to automate RapidShare downloading. Here is how I do it.
1. Collect all RapidShare links that I want to download and paste them into a text file.
Unlimited rapidshare downloading
2. Run Cryptload
3. On the text file, press CTRL+A to select all, and then press CTRL+C. Link collector will appear and it will automatically decrypt the links.
Cryptload Link Collector Decrypt RapidShare Links
4. Press Add button and press OK at Package settings. You can change the downloaded files location if you want. What if your router's model is not in the list? Not to worry at all because the people who created Cryptload are very nice people and they are very willing to help you to create CLR file to support your router. Here's what you need to do. 1.Install Live HTTP Headers extension for your Firefox browser.
2. Run Firefox, go to Tools -> Live HTTP Headers. Make sure capture checkbox is checked.
3. Go to Firefox window, login to your router, manually disconnect and then reconnect to the internet.
4. Go back to the Live HTTP headers, click Save all button and save it as router.txt
5. Click close to close Live HTTP headers.
6. Go to www.nopaste.com, enter your name in Nick, Description as your router brand with model and firmware version if possible. Make sure Plain is selected for language. Click on the Browse button and look for the router.txt file. Finally click Paste.
7. Wait for a few seconds, and you'll be forwarded to a new page with the URL something like http://nopaste.com/p/xXXxxXxxX.
8. Go to www.cryptload.info website, at Live-Support, enter your username (your name), E-mail and click Los button. If cryptload staff is available, you can give them the nopaste URL to create your router's CLR file. If not, you can fill up the form to send an email to them. I am sure they'll get back to you with your CLR file. Another way is to join Cryptload IRC channel and try getting help there. The person that patiently helped me from the beginning till the end was Apokalypser.
IRC Server: irc.german-elite.net
Channel: #cryptload Once you got the CLR file from Cryptload staff, copy it to Cryptload's router folder and it'll be included in the router list when you run Cryptload the next time. Cryptload is a perfect way to unlimited rapidshare downloading. Well, only perfect for those with dynamic IP address. It is developed by shira, bocka and apokalypser. For those with static IP adress Rapid GraB may be the best way for you. NOTE: Cryptload requires at least Microsoft .NET Framework v2.0 and above. [ Download Cryptload | Cryptload Website ]

RapidShare HACKING

  • Simply Copy the CODE given below

  • Open Command prompt. ( run ->cmd )

  • Paste the Content There. [ Hope u know how to paste on the cmd Prompt ]

  • Now try the rapidshare link again

  • and it wont ask you to Wait for more than ONE minute.








@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
exit






well it is known trick now nothing new in it

but

Keep checking this page for working Premium Rapidshare "user id" and "passwords"
Advanced Rapid Share Hack
Keep posting if u know more
thanks




New working trick .. genuine



After searching a lot i found dis amazing thing. its like a proxy browser called TORPAK..it can change ur permanent IP to static IP. so jus wen u restart ur browser u will hav new IP... u can also set intervals between changing ur proxy...so now download mutliple files at d same time......it also has integration of IDM with it..

http://image.wetpaint.com/wiki/rahulhackingarticles/image/fVGHgC0vlpimZKT4YHzWyw==124115/GW799H641

tip:

u have to close this perticular browser than open again and it will start downloading from RAPIDSHARE again no need to disconnect..
easy..

google it download n ~cheers~

Easy Way to Delete Rapidshare Cookie


If you logged into Rapidshare with an account that was detected by fraud detection you will need to delete the Rapidshare cookie. You could either:
  • Delete all the cookies, but this will makeyou have to login back into every website that you told the browser to auto login for you.
  • Go through every cookie and find that one rapidshare cookie.

Delete Rapidshare Cookie


So, here comes this little trick! You could bookmark this link and click it every timeyou need to delete ONLYRapidshare cookie:


http://rapidshare.de/cgi-bin/premium.cgi?logout=1



3. Use a proxy with SwitchProxy and Firefox:


4. Use an anonymous service:
    Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this systemks.. u need to download Firefox 1.5 for it.. u can get the same by typing "Firefox old apps" in google. begin tor by enabling it on Firefox(right bottom)

    Anonymizer is inexpensive, easy to use, but not free. Other pay services would likely work as well.

BELOW TEXT IS NOT TESTED BY ME
The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.

The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. But most of the time, that advantage is available only to people with the programming skills to make the changes they want. That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.

Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools. It changes how Web pages look and act by altering the rendering process. Greasemonkey is to Firefox what aftermarket parts are to cars -- it lets you personalize your browser by making it faster and more powerful or simply by making browsing more aesthetically pleasing. How and why you will use Greasemonkey (and I predict you will, if you don't already) will depend on how you browse now.

CODE
http://greasemonkey.mozdev.org/



1) Install the Greasemonkey extension >>
CODE
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi



2) Restart Firefox

3) Go to

CODE
http://rapidshare.de/files/1034529/rapidshare.user.js.html



4) Right click on rapidshare.user.js and choose "Install User Script".

Run FireFox.
From File Menu click on Open File then brouse to whereever you saved the 'greasemonkey.xpi' plug-in. Open it, wait a couple seconds for the install button becomes active. Click on it to install this plug-in then CLOSE FIREFOX.
Run FireFox again. From the File Menu click on Open File then brouse to whereever you saved the 'rapidshare.user.js'. Open it. Click the Tools Menu then click on Install User Script then click OK.
Close FireFox.

The script will let you enjoy "no wait" and multiple file downloads

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting